trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 ·...

11
Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved. Trends of cyber attack Importance of academia collaboration for cyber defense 2015/1/21 Masanori Kusunoki [email protected] CSO Board, Yahoo! JAPAN

Upload: others

Post on 20-May-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

Trends of cyber attackImportance of academia collaboration for cyber defense

2015/1/21

Masanori [email protected]

CSO Board, Yahoo! JAPAN

Page 2: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

P2

Self Introduction – Masanori Kusunoki

Internet Research Institute (1998-2002)

• JPIX, Web SSO, Mobile, Banking, MANet

Microsoft (2002-2012)

• Tech Product Manager, Windows Server

• Deputy CTO, National Standards Officer• National Information Security Strategy, METI

• Planning NISC under Blaster virus attack on 2003

• Standardize OOXML, ePub & Cloud Computing

Cabinet Secretariat, Government of Japan (2011-)

• Executive Advisor to the Government CIO• Prepare Social Security & Tax Number System

• Autonomous Vehicle, Regulatory reform, e-Government etc…

Yahoo! JAPAN (2012-)• Identity Federation, Financial and Payment Services Company

• Company Information Security Manager, CSO Board

Page 3: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

P3

Page 4: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

P4Increase damage of Identity Theft in Japan

0

5

10

15

20

25

30

2013Q1 2013Q2 2013Q3 2013Q4 2014Q1 2014Q2 2014Q3

other

ID Theft

Fake card

クレジットカード不正使用被害の集計結果について - 日本クレジット協会 (2014.12.26)

(100M Yen)

Page 5: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

P5Yahoo! JAPAN ID and Payment

PaymentBrowse / Login

73.54M unique browsers /

day

28.29MID monthly active

users

27M Users* September 2014* July – September

2014

Page 6: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

P6Death of Password Authentication

Page 7: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

P7

Page 8: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

P8

Illustration: MCKIBILLO, IEEE Spectrum, 2014

Page 9: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

P9Emerging threats in IoT Era.

Page 10: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

P10Conclusion

• Identity Theft is one of critical issue in security field• Online Banking, Electronic Commerce and Web Services

• Password is dead, but we need to continue business

• Security technology trends move from theoretical safety into big data and human factor analytics

• Industry needs new weapon and insights to fight against unknown cyber attacks

• Researcher needs raw data of current cyber attacks to establish the deal techniques learned signature attacker

• Academia collaboration to solve the chicken and egg problem in security research, it is believed that effective on to prepare for the unknown attacks

Page 11: Trends of cyber attack - 九州大学サイバーセキュリティセンター · 2017-09-01 · Title: 実戦からのセキュリティ対策 Author: 高 元伸 Created Date: 1/30/2015

Copyright (C) 2015 Yahoo Japan Corporation. All Rights Reserved.

Thank You!